当使用绑定连接时,JMS用户名和密码直接传递到OAM用户身份验证函数以进行身份验证。
When bindings connections are used, the JMS username and password are passed directly to the OAM authenticate user function for authentication.
不过,问题是加载证书的函数并没有请求使用加密证书的密码。
The trouble, though, is that the functions that load the certificates do not ask for a password for encrypted certificates.
现在提示用户输入密码的回调函数已经创建好了,然后我们就可以使用真正导入证书的函数了。
Now that the callback function has been created so the user can be prompted for a password, the functions to actually import the certificates can be used.
该函数将OD BC连接器字符串、用户名称和密码作为参数。
This function takes an ODBC connector string, a user name, and a password as parameters.
因此,若无密码键入,传递到该函数的是未初始化的变量和脚本错误结果。
Hence, with no password entered, the function is passed an uninitialized variable and a script error results.
因此,要使用用户名db2inst1和密码ibmdb2连接到样本数据库SAMPLE ,可以在我们的脚本中使用下面这个函数
So, to connect to our sample database SAMPLE with user name db2inst1 and password ibmdb2, we can use the following function in our scripts
相反的,密码要存储成某个hash函数的输出。
Instead, passwords are stored as the output of a hash function.
“salt”由一些随机数据位组成,用于和密码同时输入hash函数,而从以下两个主要方面缓解风险
A "salt" consists of random bits used as an input to the hash function in conjunction with the password, and mitigates the risk in two major ways
代码中将用户名和密码存储在MQCSP结构中,并在调用时将指向此结构的指针psecurityparms传递给该函数。
The username and password are stored in a MQCSP structure, and a pointer to this structure, pSecurityParms, is passed into the function when it is called.
它包含用来修改密码的pam_chauthtok函数。
It includes the pam_chauthtok function to change the password.
如您已经看到的,odbc_connect函数接受od bc友好的链接字符串、数据库用户名称和相关密码。
You've already seen that odbc_connect takes in an ODBC-friendly connection string, a database user name, and the relevant password.
为了使SSL会话中所使用的加密算法和散列函数的规范更容易,这些算法被分组到各个密码套件(CipherSuite)中。
To facilitate the specification of encryption algorithms and hash functions that are used during an SSL session, the algorithms are grouped into CipherSuites. A CipherSuite defines.
加密算法和散列函数被进一步分组到密码规范中。
The encryption algorithm and the hash function are further grouped into CipherSpecs.
如果正在使用回调函数来请求对数据进行加密使用的密码,最好是以某种方式请求两次,这样可以多一次机会接收用户的输入。
If the callback is being used to request a password for encrypting data, it is preferable to ask for the password twice, in some fashion, to catch any typos.
构造函数接受用于指定数据源(即dsn)的参数,可能还包括用户名和密码参数(如果有的话)。
The constructor accepts parameters for specifying the database source (known as the DSN) and optionally for the username and password (if any).
如果你需要在本地验证用户的密码,用盐使用单向散列函数。
If you need to locally validate a user's password, use a one-way hashing function with salt.
LdapAuthenticationProvider构造函数的第一个参数是authenticator,该参数通过检查用户的用户名和密码对LDAP目录的用户进行身份验证。
The first parameter to the LdapAuthenticationProvider constructor is authenticator, which authenticates a user with the LDAP directory by verifying the user's username and password.
完成后,使用用户名和密码构造函数参数将它映射到Scitter类非常简单,如清单6所示。
Once that works, it's pretty easy to see how this will map into the Scitter class itself using the username and password constructor parameters, shown in Listing 6.
将用户的del . icio . us用户名和密码传递给对象构造函数来完成HTTP身份验证。
The user's del.icio.us user name and password are passed to the object constructor and used to perform HTTP authentication.
注意:当使用这个函数时,整个文件都将被显示出来——包括密码和其它敏感信息。
Note: When using this function, the entire file will be displayed - including passwords and any other sensitive information!
多输出逻辑函数是构造密码系统的重要工具,相关免疫性是设计安全逻辑函数的重要准则。
Multiple outputs logic function is an important tool for constructing cryptography systems, and correlation immunity is a critical criterion in designing secure logic functions.
网站的目的是证明用简单哈希函数来保护有价值的密码是不安全的,并促使开发人员使用更为安全的方法。
The goal of FreeRainbowTables. com is to prove the insecurity of using simple hash routines to protect valuable passwords, and force developers to use more secure methods.
平衡性和相关免疫性是函数的两个重要密码特性,但目前对两者之间的关系还没有得到很好地研究。
Both balancedness and correlation immunity is one of the most important cryptographic characteristics of a Boolean function to which have gotten many researches respectively.
扩散准则是分组密码中布尔函数设计的基本准则。
The propagation criterion is an important criterion of designing Boolean functions in block cipher.
本文给出了欧拉函数的一些重要而有趣的性质,这些性质可对密码的设计与分析起指导作用。
This paper lists some important and interesting properties of the Euter totient functions, which have the potential use in the design and analysis of cryptosystems.
基于仿射密码的加密原理,构造了一种差分跳频的频转移函数。
Based on the encryption principle of affine cipher, a frequency transition function of DFH is designed.
利用密码哈希函数的良好性质和DLP的困难性问题,构造了一个可验证可关联的环签名方案。
Making use of the good properties of cryptography Hash functions and the difficulties of DLP, a verifiable and linkable ring signature scheme is constructed.
文中以DES加密算法为例,在分析DES加密过程、密钥计算、加密函数和解密过程的基础上,探讨分组密码的设计原则。
The general design rules of block cipher is discussed by analyzing the encryption process, key generating, encryption function and decryption process of des algorithm.
如果非零,客户端将只使用操作系统函数来生成一个随机的图形用户界面的远程访问密码,并将在函数无效时退出。
If nonzero, the client will use only OS-level functions to generate a random GUI RPC password, and will exit if these functions fail.
我们利用该新算法以更低的计算复杂度计算出了LILI- 128流密码体制的降次函数。
When applied to LILI-128 cryptographic system to construct depressed functions, the new algorithm obtains a lower computational complexity.
应用推荐